Authentication and Authorization Models

In computer science distributed systems could be more secured with a distributed trust model based on either PKI or kerberos. However, it becomes difficult to establish trust relationship across heterogeneous domains due to different actual trust mechanism and security policy as well as the intrinsic flaw of each trust model. Since internet has been used commonly in information systems technologies, many applications need some security capabilities to protect against threats to the communication of information. Two critical procedures of these capabilities are authentication and authorization.

Provided by: International Journal of Computer Science and Security (IJCSS) Topic: Security Date Added: Apr 2011 Format: PDF

Find By Topic